The Community for Technology Leaders
Dependability of Computer Systems, International Conference on (2006)
Szklarska Poreba, Poland
May 25, 2006 to May 27, 2006
ISBN: 0-7695-2565-2
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. xi
Modeling

UML Based Reverse Engineering for the Verification of Railway Control Logics (Abstract)

Angela Sanseviero , ANSALDO SIGNAL, Naples, Italy
Francesco Flammini , Universita Federico II di Napoli, Italy
Pietro Marmo , ANSALDO SIGNAL, Naples, Italy
Armando Lazzaro , ANSALDO SIGNAL, Naples, Italy
Chiara Abbaneo , ANSALDO SIGNAL, Naples, Italy
Nicola Mazzocca , Universita "Federico II" di Napoli, Italy
pp. 3-10

Compatibility of Software Components - Modeling and Verification (Abstract)

W.M. Zuberek , Memorial University of Newfoundland
D.C. Craig , Memorial University of Newfoundland
pp. 11-18

Feasibility Analysis of MDA-based Database Design (Abstract)

Zbigniew Huzar , Wroclaw University of Technology, Poland
Bogumila Hnatkowska , Wroclaw University of Technology, Poland
Iwona Dubielewicz , Wroclaw University of Technology, Poland
Lech Tuzinkiewicz , Wroclaw University of Technology, Poland
pp. 19-26

Embedded Systems Modeling Language (Abstract)

Artur Krystosik , Warsaw University of Technology
pp. 27-34

State Model of Service Reliability (Abstract)

Z. Lipinski , University of Opole, Poland
pp. 35-42

Partially automatic generation of fault-trees with time dependencies (Abstract)

Jan Magott , Technical University of Wroclaw, Poland
Pawel Skrobanek , Technical University of Wroclaw, Poland
pp. 43-50

Formal Semantics and Reasoning about UML Class Diagram (Abstract)

Marcin Szlenk , Warsaw University of Technology, Poland
pp. 51-59
Methodology and Tools

Enhancing Fault Injection Testbench (Abstract)

A. Tymoczko , Warsaw University of Technology, Poland
P. Gawkowski , Warsaw University of Technology, Poland
P. Zygulski , Warsaw University of Technology, Poland
J. Sosnowski , Warsaw University of Technology, Poland
pp. 76-83

Hazard Prevention by Forced Time Constraints (Abstract)

Janusz Gorski , Gdansk University of Technology, Gdansk, Poland
Grzegorz Golaszewski , Gdansk University of Technology, Gdansk, Poland
pp. 84-91

An Approach for Evaluating Trust in IT Infrastructure (Abstract)

Marek Zagorski , Gdansk University of Technology, Poland
Janusz Gorski , Gdansk University of Technology, Poland
pp. 92-99

Introduction to the Dependability Modeling of Computer Systems (Abstract)

Wojciech Zamojski , Wroclaw University of Technology, Poland
Dariusz Caban , Wroclaw University of Technology, Poland
pp. 100-109
Dependability og Computer Networks

Survey of Recovery Schemes in MPLS Networks (Abstract)

Teresa Gomes , Coimbra University, INESC Coirnbra, Portugal
Luisa Jorge , Polytechnic Institute of Braganqa, INESC Coirnbra, Portugal
pp. 110-118

d-HMAC Dynamic HMAC function (Abstract)

Mohannad Najjar , Applied Science University, Jordan
Firas Najjar , Applied Science University, Jordan
pp. 119-126

Security Aspects of SCADA and Corporate Network Interconnection: An Overview (Abstract)

Paulo S. Motta Pires , Universidade Federal do Rio Grande do Norte, Brazil
Luiz Affonso H.G. Oliveira , Universidade Federal do Rio Grande do Norte, Brazil
pp. 127-134

Building Dependable Intrusion Prevention Systems (Abstract)

Piotr Buciak , Warsaw University of Technology, Poland
Piotr Sapiecha , Warsaw University of Technology, Poland
Jakub Botwicz , Warsaw University of Technology, Poland
pp. 135-142

Bandwidth control in redundant news server links (Abstract)

Tomasz R. Surmacz , Wroclaw University of Technology, Poland
pp. 143-149

Fault Tolerant Topological Design for Computer Networks (Abstract)

Ewa Szlachcic , Wroc..aw University of Technology, Poland
pp. 150-159
Software Security and Reliability

Selecting Technology for Disaster Recovery (Abstract)

Rafal Cegiela , Warsaw University of Technology, Poland
pp. 160-167

Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux Systems (Abstract)

Max Walter , Technische Universitat Munchen, Germany
Carsten Trinitis , Technische Universitat Munchen, Germany
Jan-Thomas Czornack , Technische Universitat Munchen, Germany
pp. 168-174

Applying Software Rejuvenation in a Two Node Cluster System for High Availabilit (Abstract)

V. P. Koutras , University of the Aegean, Greece
A. N. Platis , University of the Aegean, Chios, Greece
pp. 175-182

Security of Web Services (Abstract)

H. Krawczyk , Gdansk University of Technology
M. Wiel , Gdansk University of Technology
pp. 183-190

Model-based Automatic Test Generation for Event-Driven Embedded Systems using Model Checkers (Abstract)

Zoltan Micskei , Budapest University of Technology and Economics, Hungary
Istvan Majzik , Budapest University of Technology and Economics, Hungary
pp. 191-198

An Empirical Study on a Specification-Based Program Review Approach (Abstract)

Fumiko Nagoya , Hosei University, Tokyo, Japan
Shaoying Liu , Hosei University, Tokyo, Japan
Yuting Chen , Hosei University, Tokyo, Japan
pp. 199-206

Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference Matrix (Abstract)

Zyad Shaaban , Applied Science University, Amman, Jordan
Luai Al Shalabi , Applied Science University, Amman, Jordan
pp. 207-214

Evaluation of Dependability of Multi-tier Internet Business Applications with Queueing Networks (Abstract)

Andrzej Zalewski , Warsaw University of Technology, Poland
Andrzej Ratkowski , Warsaw University of Technology, Poland
pp. 215-222

Security Enhancement of Java Remote Method Invocation (Abstract)

Dominik Zalewski , Adam Mickiewicz University, Poznan, Poland
pp. 223-231
Multi-Agent Systems

Byzantine Fault Tolerance for Agent Systems (Abstract)

Tadashi Araragi , NTT Communication Science Laboratories, Japan
pp. 232-239

CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack (Abstract)

Velik Bellemin , Swiss Federal Institute of Technology (EPFL)
Tadashi Araragi , NTT Communication Science Laboratories
pp. 240-247

Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents (Abstract)

Habiba Drias , University of Sciences and technology USTHB, Algiers, Algeria
Dalila Boughaci , University of Sciences and technology USTHB, Algiers, Algeria
Ahmed Bendib , University of Sciences and technology USTHB, Algiers, Algeria
Belaid Benhamou , University of Sciences and technology USTHB, Algiers, Algeria
Youcef Bouznit , University of Sciences and technology USTHB, Algiers, Algeria
pp. 248-255

A Distributed Firewall using Autonomous Agents (Abstract)

Habiba Drias , BP 32, El-Alia Beb-Ezzouar, 16111, Algiers, Algeria
Abdelkader Aissioui , BP 32, El-Alia Beb-Ezzouar, 16111, Algiers, Algeria
Belaid Benhamou , BP 32, El-Alia Beb-Ezzouar, 16111, Algiers, Algeria
Brahim Oubeka , BP 32, El-Alia Beb-Ezzouar, 16111, Algiers, Algeria
Dalila Boughaci , BP 32, El-Alia Beb-Ezzouar, 16111, Algiers, Algeria
pp. 256-263

A Regulatory Software Maintenance Environment Using Agent-Based Software Configuration Management (Abstract)

I-Hsin Chou , Atomic Energy Council, Taiwan
Chin-Feng Fan , Science and Engineering Dept., Yuan-Ze U, Taiwan
pp. 264-275
Fault Tolerance in Digital Systems

Self-Dual Modules in Design of Dependable Digital Devices (Abstract)

Janusz Biernat , Wroclaw University of Technology, PL
pp. 276-281

Low-cost and Universal Secure Scan: a Design- Architecture for Crypto Chips (Abstract)

Marcin Gomulkiewicz , Institute of Mathematics and Computer Science, Wroclaw University of Technology, POLAND
Maciej Nikodem , Institute of Computer Science, Automatics and Robotics, Wroclaw University of Technology, POLAND
Tadeusz Tomczak , Institute of Computer Science, Automatics and Robotics, Wroclaw University of Technology, POLAND
pp. 282-288

CAD software for designing of Totally Self Checking Sequential Circuits (Abstract)

Jerzy W. Greblicki , Wroclaw University of Technology, Poland
pp. 289-297

Residue Arithmetic in FPGA Matrices (Abstract)

Tadeusz Tomczak , Tadeusz Tomczak
pp. 297-305
Applications

Risk Assessment Tool for Maintenance Selection (Abstract)

Jaroslaw Sugier , Wroclaw University of Technology, Poland
George J. Anders , Technical University of Lodz, Poland
pp. 306-313

Securing of Integrated Protection of Technical Information by Application of Special Engineering Decisions (Abstract)

O.V. Berestnev , IMINMASH of NAN Belarus
E.M. Kharitonov , Belarus Republican Fund of Fundamental Researches
pp. 314-318

A Multi-tier Architecture to Safely Share Digital Medical Images (Abstract)

Mohamed Benmohamed , Mentouri University Constantine, Algeria
Samia Boucherkha , Mentouri University Constantine, Algeria
pp. 319-326

Digital Instrumentation and Control Failure Events Derivation and Analysis for Advanced Boiling Water Reactor (Abstract)

Chun-Yu Chen , National Tsing Hua University, Taiwan
Cherng-Tsong Kuo , Institute of Nuclear Energy Research, Taiwan
Chunkuan Shih , National Tsing Hua University
Chun-Yu Chen , National Tsing Hua University
Li-Hsin Wang , Institute of Nuclear Energy Research, Taiwan
Wan-Tsz Tu , National Tsing Hua University
Wan-Tsz Tu , National Tsing Hua University, Taiwan
Yuan-Chang Yu , Institute of Nuclear Energy Research, Taiwan
Chang Tzeng , Institute of Nuclear Energy Research, Taiwan
Swu Yih , DML International, Hongkong
Wei-Yi Yang , National Tsing Hua University
Ming-Huei Chen , Institute of Nuclear Energy Research, Taiwan
Hsun-Ho Wang , Institute of Nuclear Energy Research, Taiwan
Hui-Wen Huang , National Tsing Hua University
pp. 327-334

Efficiency of Reliability Evaluation of Large Electric Power Systems (Abstract)

G. Anders , University of Toronto, Canada
B. Kalinowski , Technical University of Wroclaw, Poland
pp. 343-350

Estimation of Impact of Maintenance Policies on Equipment Risk of Failure (Abstract)

George Anders , Kinectrics Inc., Toronto, Canada
Henryk Maciejewski , Wroclaw University of Technology, Poland
pp. 351-357

Fuzzy approach to economic analysis of dispatcher driven discrete transport systems (Abstract)

Jacek Mazurkiewicz , Wroclaw University of Technology
Tomasz Walkowiak , Wroclaw University of Technology
pp. 366-373
Author Index

Author Index (PDF)

pp. 382
82 ms
(Ver 3.1 (10032016))